Computer Systems: Theory, Technology, and Applications

Free Download

Authors:

Series: Monographs in Computer Science

ISBN: 9780387201702, 0-387-20170-X

Size: 3 MB (3111917 bytes)

Pages: 357/357

File format:

Language:

Publishing Year:

Category:

Andrew J. Herbert, Karen Sparck Jones9780387201702, 0-387-20170-X

An invited collection of peer-reviewed papers surveying key areas of Roger Needham’s distinguished research career at Cambridge University and Microsoft Research.From operating systems to distributed computing, many of the world’s leading researchers provide insight into the latest concepts and theoretical insights – many of which are based upon Needham’s pioneering research work.A critical collection of edited-survey research papers spanning the entire range of Roger Needham’s distinguished scientific career, from operating systems to distributed computing and security. Many of the world’s leading researchers survey their topics’ latest developments and acknowledge the theoretical foundations of Needham’s work.Introduction to book written by Rick Rashid, Director of Microsoft Research Worldwide.

Table of contents :
Contents……Page 8
Preface……Page 12
Roger Needham: 50 + 5 Meeting Programme……Page 14
Contributors……Page 16
Introduction: Roger Needham……Page 20
1 On Access Control, Data Integration, and Their Languages……Page 28
2 Protocol Analysis, Composability and Computation……Page 34
3 Access Control in Distributed Systems……Page 40
4 Implementing Condition Variables with Semaphores……Page 48
5 Clumps, Clusters and Classification……Page 58
6 How to Implement Unnecessary Mutexes……Page 70
7 Bioware Languages……Page 78
8 The Economics of Open Systems……Page 86
9 From Universe to Global Internet……Page 92
10 Needham-Schroeder Goes to Court……Page 96
11 The Design of Reliable Operating Systems……Page 98
12 An Historical Connection between Time-Sharing and Virtual Circuits……Page 104
13 On Cross-Platform Security……Page 108
14 Distributed Computing Economics……Page 112
15 The Titan Influence……Page 122
16 Middleware? Muddleware?……Page 128
17 Grand Challenges for Computing Research……Page 136
18 Sentient Computing……Page 144
19 Cyber Security in Open Systems……Page 152
20 Software Components: Only the Giants Survive……Page 156
21 Security Protocols: Who Knows What Exactly?……Page 166
22 Volume Rendering by Ray-Casting in Shear-Image Order……Page 172
23 A Conceptual Authorization Model for Web Services……Page 184
24 The Trouble with Standards……Page 192
25 Novelty in the Nemesis Operating System……Page 196
26 A Technology Transfer Retrospective……Page 204
27 An Optical LAN……Page 214
28 What’s in a Name?……Page 224
29 The Cryptographic Role of the Cleaning Lady……Page 230
30 Real Time in a Real Operating System……Page 232
31 Zen and the Art of Research Management……Page 242
32 The Descent of BAN……Page 244
33 Brief Encounters……Page 248
34 Retrieval System Models: What’s New?……Page 256
35 Slammer: An Urgent Wake-Up Call……Page 262
36 Caching Trust Rather Than Content……Page 268
37 Least Privilege and More……Page 272
38 Using Sharing to Simplify System Management……Page 278
39 An RSA-Related Number-Theoretic Surprise……Page 288
40 Application-Private Networks……Page 292
41 Using the CORAL System to Discover Attacks on Security Protocols……Page 298
42 On the Role of Binding and Rate Adaptation in Packet Networks……Page 306
43 Technologies for Portable Computing……Page 314
44 Multiple Alternative Voting……Page 324
45 The Semiotics of Umbrellas……Page 330
46 Computers for Specialized Application Areas……Page 336
Computer Security?……Page 338
Roger Needham: Publications……Page 346

Reviews

There are no reviews yet.

Be the first to review “Computer Systems: Theory, Technology, and Applications”
Shopping Cart
Scroll to Top